{"api_version":"1","generated_at":"2026-05-12T23:15:54+00:00","cve":"CVE-2020-7830","urls":{"html":"https://cve.report/CVE-2020-7830","api":"https://cve.report/api/cve/CVE-2020-7830.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-7830","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-7830"},"summary":{"title":"CVE-2020-7830","description":"RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier.","state":"PUBLIC","assigner":"vuln@krcert.or.kr","published_at":"2020-09-02 20:15:00","updated_at":"2020-09-11 16:45:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582","name":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582","refsource":"MISC","tags":["Third Party Advisory"],"title":"KrCERT/CC - KISA 인터넷 보호나라&KrCERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-7830","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7830","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"7830","vulnerable":"1","versionEndIncluding":"2018.0.2.50","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"raonwiz","cpe5":"raon_kupload","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vuln@krcert.or.kr","DATE_PUBLIC":"2020-09-02T01:55:00.000Z","ID":"CVE-2020-7830","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"RAONWIZ","product":{"product_data":[{"product_name":"RAON KUpload","version":{"version_data":[{"version_value":"<=2018.0.2.50"}]}}]}}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"File download"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582","name":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-09-02 20:15:00","lastModifiedDate":"2020-09-11 16:45:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:raonwiz:raon_kupload:*:*:*:*:*:*:*:*","versionEndIncluding":"2018.0.2.50","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"7830","Ordinal":"168113","Title":"CVE-2020-7830","CVE":"CVE-2020-7830","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"7830","Ordinal":"1","NoteData":"RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"7830","Ordinal":"2","NoteData":"2020-09-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"7830","Ordinal":"3","NoteData":"2020-09-02","Type":"Other","Title":"Modified"}]}}}